Monitoring system logs using the Logcheck Cover Image

Wykorzystanie mitm i dnsspoof do przechwycenia sesji komunikacyjnej
Monitoring system logs using the Logcheck

Author(s): Jacek Wołoszyn
Subject(s): Education
Published by: Wydawnictwo Oświatowe FOSZE
Keywords: man-in-the-middle, dnsspoof, 802.11, wireless network

Summary/Abstract: The article describes an attack mitm /man-in-the-middle/ along with redirecting DNS traffic on the selected machine. Discuss the process allows you to trace the path of the attacker. Network administrators will be able to carefully look at the problem in relation to their own network resources.

  • Issue Year: V/2014
  • Issue No: 2
  • Page Range: 419-424
  • Page Count: 6
  • Language: Polish